TrustCentral solves the problems of establishing and authenticating identity on the Internet, as well as the security of communications between authenticated endpoints

TrustCentral’s solutions will allow a remote individual, entity or device to digitally authenticate its identify with a user of the system and thereby establish a Secure Communication LineTM between them.

TrustCentral’s solution will provide users (including devices) with user-friendly, sophisticated encryption tools, enabling them to exchange private, secure messages and files, as well as to create identity-connected, non-repudiable records.

TrustCentral will make this technology available to technology providers, enterprises and governments through a Platform and API as a tool-set to enable them to create previously difficult or impossible solutions for their customers and users.

TrustCentral’s Security Ecosystem has been designed by the highly-respected Dr. David W. Kravitz. (Among Dr. Kravitz’s many impressive accomplishments is the invention of the Digital Signature Algorithm – DSA).

TrustCentral’s first two patents have been granted (with multiple patents-pending).

The Platform & API

The TrustCentral Platform & API may be used to authenticate the identity of an outside party and then extend Network Security Outside a FirewallTM to that specific entity. Thereafter sensitive, encrypted content and/or non-repudiable assertions may be shared with confidence.

TrustCentral’s platform will make it easy for technology providers, enterprises and governments to validate remote identities as well as to add sophisticated cryptographic security solutions to their applications using TrustCentral’s API. Benefits include:

The platform can be used to authenticate Secure Communication LinesTM with outside parties

Users can then securely send documents/files to enterprises or individuals outside of an existing network

System administrators can control policy regarding outside parties, including revoking users and monitoring activity

Authentication levels, use of passwords, multi-factor authentication, additional identity validation, etc. can be “tuned” at a sysadmin level, user level or document level, as well as being tuned per-communication line, per-communication, per-document or other basis. This way, extra-confidential documents or identities can achieve appropriately-tuned security

CRM systems may be integrated with the TrustCentral API for the authorization of sensitive content to multiple authenticated parties

Summary

Designed for technology providers, enterprises and governments, the TrustCentral Platform & API will enable identity authentication of an outside party and then extend network security beyond a firewall to that specific entity. Thereafter sensitive, encrypted content and/or non-repudiable assertions may be shared with confidence